-
2
-
-
84870911648
-
-
Akamai Technologies. 3rd quarter, Technical report, 2009
-
Akamai Technologies. The state of the internet report (3rd quarter, 2009). Technical report, 2009.
-
(2009)
The State of the Internet Report
-
-
-
4
-
-
24344436426
-
The blaster worm: Then and now
-
July
-
M. Bailey, E. Cooke, F. Jahanian, D. Watson, and J. Nazario. The blaster worm: Then and now. IEEE Security and Privacy, 3:26-31, July 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Watson, D.4
Nazario, J.5
-
5
-
-
77956376882
-
Anomaly extraction in backbone networks using association rules
-
New York, NY, USA, ACM
-
D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian. Anomaly extraction in backbone networks using association rules. In Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC '09, pages 28-34, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, IMC '09
, pp. 28-34
-
-
Brauckhoff, D.1
Dimitropoulos, X.2
Wagner, A.3
Salamatian, K.4
-
7
-
-
84870931321
-
-
CAIDA. UCSD Network Telescope. http://www.caida.org/data/realtime/ telescope/.
-
UCSD Network Telescope
-
-
-
10
-
-
84870899342
-
Extracting benefit from harm: Using malware pollution to analyze the impact of political and geophysical events on the internet
-
A. Dainotti, R. Amman, E. Aben, and K. C. Claffy. Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the internet. SIGCOMM Comput. Commun. Rev., 42(1):31-39, 2012.
-
(2012)
SIGCOMM Comput. Commun. Rev.
, vol.42
, Issue.1
, pp. 31-39
-
-
Dainotti, A.1
Amman, R.2
Aben, E.3
Claffy, K.C.4
-
11
-
-
84870936594
-
-
Cooperative Network Security Community - Internet Security
-
Cooperative Network Security Community - Internet Security. www.dshield.org.
-
-
-
-
13
-
-
63049131522
-
How healthy are today's enterprise networks?
-
ACM
-
S. Guha, J. Chandrashekar, N. Taft, and K. Papagiannaki. How healthy are today's enterprise networks? In Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, pages 145-150. ACM, 2008.
-
(2008)
Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement
, pp. 145-150
-
-
Guha, S.1
Chandrashekar, J.2
Taft, N.3
Papagiannaki, K.4
-
15
-
-
84867821901
-
-
IANA - Internet Assigned Numbers Authority. PORT NUMBERS. http://www.iana.org/assignments/port-numbers, 2011.
-
(2011)
Port Numbers
-
-
-
17
-
-
34548268555
-
Identifying and tracking suspicious activities through IP gray space analysis
-
ACM
-
Y. Jin, Z. Zhang, K. Xu, F. Cao, and S. Sahu. Identifying and tracking suspicious activities through IP gray space analysis. In Proceedings of the 3rd annual ACM workshop on Mining network data, page 12. ACM, 2007.
-
(2007)
Proceedings of the 3rd Annual ACM Workshop on Mining Network Data
, pp. 12
-
-
Jin, Y.1
Zhang, Z.2
Xu, K.3
Cao, F.4
Sahu, S.5
-
19
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
J. Jung, V. Paxson, A. Berger, and H. Balakrishnan. Fast portscan detection using sequential hypothesis testing. In Proceedings of the IEEE Symposium on Security and Privacy, pages 211-225, 2004.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.3
Balakrishnan, H.4
-
21
-
-
33847303101
-
Blinc: Multilevel traffic classification in the dark
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos. Blinc: multilevel traffic classification in the dark. In Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '05, 2005.
-
Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '05, 2005
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
22
-
-
85094641037
-
Studying black holes in the internet with hubble
-
E. Katz-Bassett, H. V. Madhyastha, J. P. John, A. Krishnamurthy, D. Wetherall, and T. Anderson. Studying black holes in the internet with hubble. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08, 2008.
-
Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08, 2008
-
-
Katz-Bassett, E.1
Madhyastha, H.V.2
John, J.P.3
Krishnamurthy, A.4
Wetherall, D.5
Anderson, T.6
-
23
-
-
84866490384
-
Lifeguard: Practical repair of persistent route failures
-
E. Katz-Bassett, C. Scott, D. R. Choffnes, I. Cunha, V. Valancius, N. Feamster, H. V. Madhyastha, T. Anderson, and A. Krishnamurthy. Lifeguard: practical repair of persistent route failures. In Proceedings of the ACM SIGCOMM 2012, 2012.
-
Proceedings of the ACM SIGCOMM 2012, 2012
-
-
Katz-Bassett, E.1
Scott, C.2
Choffnes, D.R.3
Cunha, I.4
Valancius, V.5
Feamster, N.6
Madhyastha, H.V.7
Anderson, T.8
Krishnamurthy, A.9
-
24
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
ACM
-
H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and K. Lee. Internet traffic classification demystified: myths, caveats, and the best practices. In Proceedings of the 2008 ACM CoNEXT conference, page 11. ACM, 2008.
-
(2008)
Proceedings of the 2008 ACM CoNEXT Conference
, pp. 11
-
-
Kim, H.1
Claffy, K.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.6
-
25
-
-
82755166662
-
PHAS: A prefix hijack alert system
-
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang. PHAS: A prefix hijack alert system. In In Proc. USENIX Security Symposium, 2006.
-
Proc. USENIX Security Symposium, 2006
-
-
Lad, M.1
Massey, D.2
Pei, D.3
Wu, Y.4
Zhang, B.5
Zhang, L.6
-
26
-
-
47249148662
-
Passive measurement of one-way and two-way flow lifetimes
-
D. Lee and N. Brownlee. Passive measurement of one-way and two-way flow lifetimes. SIGCOMM Comput. Commun. Rev., 37(3):17-28, 2007.
-
(2007)
SIGCOMM Comput. Commun. Rev.
, vol.37
, Issue.3
, pp. 17-28
-
-
Lee, D.1
Brownlee, N.2
-
27
-
-
0742276097
-
Inside the slammer worm
-
July
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. IEEE Security and Privacy, 1:33-39, July 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
28
-
-
14944381614
-
-
Technical report, CAIDA
-
D. Moore, C. Shannon, G. Voelker, and S. Savage. Network telescopes: Technical report. Technical report, CAIDA, 2004.
-
(2004)
Network Telescopes: Technical Report
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
29
-
-
85084161486
-
Inferring internet denial-of-service activity
-
D. Moore, G. M. Voelker, and S. Savage. Inferring internet denial-of-service activity. In SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium, Berkeley, USA, 2001.
-
SSYM'01: Proceedings of the 10th Conference on USENIX Security Symposium, Berkeley, USA, 2001
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
30
-
-
14944369649
-
Characteristics of Internet background radiation
-
ACM New York, NY, USA
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of Internet background radiation. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 27-40. ACM New York, NY, USA, 2004.
-
(2004)
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
31
-
-
43949093547
-
Identification and analysis of peer-to-peer traffic
-
M. Perényi, T. D. Dang, A. Gefferth, and S. Molnr. Identification and analysis of peer-to-peer traffic. JOURNAL OF COMMUNICATIONS, 1(7), 2006.
-
(2006)
Journal of Communications
, vol.1
, Issue.7
-
-
Perényi, M.1
Dang, T.D.2
Gefferth, A.3
Molnr, S.4
-
33
-
-
84870868863
-
Detecting prefix hijackings in the internet with argus
-
X. Shi, Y. Xiang, Z. Wang, X. Yin, and J. Wu. Detecting prefix hijackings in the internet with argus. In Proceedings of the 12th ACM SIGCOMM conference on Internet measurement. ACM, 2012.
-
Proceedings of the 12th ACM SIGCOMM Conference on Internet Measurement. ACM, 2012
-
-
Shi, X.1
Xiang, Y.2
Wang, Z.3
Yin, X.4
Wu, J.5
-
35
-
-
80054118821
-
A network activity classification schema and its application to scan detection
-
Oct.
-
J. Treurniet. A network activity classification schema and its application to scan detection. IEEE/ACM Trans. Netw., 19(5):1396-1404, Oct. 2011.
-
(2011)
IEEE/ACM Trans. Netw.
, vol.19
, Issue.5
, pp. 1396-1404
-
-
Treurniet, J.1
-
36
-
-
84870903510
-
-
US Homeland Security
-
US Homeland Security. BGPmon. http://bgpmon.net/.
-
BGPmon
-
-
-
37
-
-
84870867894
-
-
Wikipedia. Netflow. http://en.wikipedia.org/wiki/Netflow.
-
Netflow
-
-
-
38
-
-
78650939601
-
Internet background radiation revisited
-
New York, NY, USA, ACM
-
E. Wustrow, M. Karir, M. Bailey, F. Jahanian, and G. Huston. Internet background radiation revisited. In Proceedings of the 10th annual conference on Internet measurement, IMC '10, pages 62-74, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 10th Annual Conference on Internet Measurement, IMC '10
, pp. 62-74
-
-
Wustrow, E.1
Karir, M.2
Bailey, M.3
Jahanian, F.4
Huston, G.5
-
39
-
-
33646179175
-
Internet intrusions: Global characteristics and prevalence
-
V. Yegneswaran, P. Barford, and J. Ullrich. Internet intrusions: global characteristics and prevalence. SIGMETRICS Perform. Eval. Rev., 31(1):138-147, 2003.
-
(2003)
SIGMETRICS Perform. Eval. Rev.
, vol.31
, Issue.1
, pp. 138-147
-
-
Yegneswaran, V.1
Barford, P.2
Ullrich, J.3
-
40
-
-
84877928848
-
ispy: Detecting ip prefix hijacking on my own
-
Dec.
-
Z. Zhang, Y. Zhang, Y. C. Hu, Z. M. Mao, and R. Bush. ispy: detecting ip prefix hijacking on my own. IEEE/ACM Trans. Netw., 18(6), Dec. 2010.
-
(2010)
IEEE/ACM Trans. Netw.
, vol.18
, Issue.6
-
-
Zhang, Z.1
Zhang, Y.2
Hu, Y.C.3
Mao, Z.M.4
Bush, R.5
-
41
-
-
36949036650
-
A light-weight distributed scheme for detecting ip prefix hijacks in real-time
-
C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis. A light-weight distributed scheme for detecting ip prefix hijacks in real-time. In Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '07, 2007.
-
Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '07, 2007
-
-
Zheng, C.1
Ji, L.2
Pei, D.3
Wang, J.4
Francis, P.5
|